Secure Locomotive to Locomotive PTC Communication
a technology for locomotives and communications, applied in the direction of wireless communication, signalling indicators on vehicles, transportation and packaging, etc., can solve the problems of introduction of cyber security issues, first train may not have, nor obtain, information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035]Two trains involved in a communication exchange may be vulnerable to a man-in-the-middle attack (MITM) due to limited information about one another's identities prior to establishing communication. A malicious actor may exploit such deficiencies in a communication exchange by gaining control of the communication exchange when the first train cannot distinguish between communications sent by the malicious actor and the second train. Train control systems may not provide sufficient identifying content to authenticate communication as coming from a particular train of the one or more trains. Additionally, the intermittent and asynchronous nature of train-to-train communication may provide the extra time a malicious actor needs to gain information that can be used to adequately impersonate both trains.
[0036]As disclosed herein, in some non-limiting embodiments or aspects, a computer-implemented method of train-to-train key exchange may include: generating a first secret random num...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


